Differentiated Latency in Data Center Networks with Erasure Coded Files

Total Page:16

File Type:pdf, Size:1020Kb

Differentiated Latency in Data Center Networks with Erasure Coded Files Differentiated latency in data center networks with erasure coded files through traffic engineering Yu Xiang, Vaneet Aggarwal, Yih-Farn R. Chen, and Tian Lan Abstract—This paper proposes an algorithm to minimize system [13], [16], [14], [28], [23]. However, little effort has weighted service latency for different classes of tenants (or been made to address the impact of data ceter networking on service classes) in a data center network where erasure-coded service latency. files are stored on distributed disks/racks and access requests are scattered across the network. Due to limited bandwidth In this paper, we utilize the probabilistic scheduling policy available at both top-of-the-rack and aggregation switches and developed in [28] and analyze service latency of erasure- tenants in different service classes need differentiated services, coded storage with respect to data center topologies and network bandwidth must be apportioned among different intra- traffic engineering. To the best of our knowledge, this is the and inter-rack data flows for different service classes in line with first work that accounts for both erasure coding and data their traffic statistics. We formulate this problem as weighted queuing and employ a class of probabilistic request scheduling center networking in latency analysis. Our result provides a policies to derive a closed-form upper-bound of service latency tight upper bound on mean service latency of erasure coded- for erasure-coded storage with arbitrary file access patterns and storage and applies to general data center topology. It allows service time distributions. The result enables us to propose a us to construct quantitative models and find solutions to a joint weighted latency (over different service classes) optimization novel latency optimization leveraging both the placement of over three entangled “control knobs”: the bandwidth allocation at top-of-the-rack and aggregation switches for different service erasure coded chunks on different racks and the bandwidth classes, dynamic scheduling of file requests, and the placement reservations at different switches. of encoded file chunks (i.e., data locality). The joint optimization We consider a data center storage system with a hierarchical is shown to be a mixed-integer problem. We develop an iterative structure. Each rack has a TOR switch that is responsible algorithm which decouples and solves the joint optimization for routing data flows between different disks and associated as 3 sub-problems, which are either convex or solvable via bipartite matching in polynomial time. The proposed algorithm storage servers in the rack, while data transfers between is prototyped in an open-source, distributed file system, Tahoe, different racks are managed by an aggregation switch that and evaluated on a cloud testbed with 16 separate physical hosts connects all TOR switches. Multiple client files are stored in an Openstack cluster using 48-port Cisco Catalyst switches. distributively using an (n; k) erasure coding scheme, which Experiments validate our theoretical latency analysis and show allows each file to be reconstructed from any k-out-of-n significant latency reduction for diverse file access patterns. The results provide valuable insights on designing low-latency data encoded chunks. We assume that file access requests may center networks with erasure coded storage. be generated from anywhere inside the data center, e.g., a virtual machine spun up by a client on any of the racks. I. INTRODUCTION We consider an erasure-coded storage with multiple tenants Data center storage is growing at an exponential speed and and differentiated delay demands. While customizing elastic customers are increasingly demanding more flexible services service latency for the tenants is undoubtedly appealing to exploiting the tradeoffs among the reliability, performance, and cloud storage, it also comes with great technical challenges storage cost. Erasure coding has seen itself quickly emerged as and calls for a new framework for delivering, quantifying, a very promising technique to reduce the cost of storage while and optimizing differentiated service latency in general erasure providing similar system reliability as replicated systems. The coded storage. arXiv:1602.05551v1 [cs.DC] 17 Feb 2016 effect of coding on service latency to access files in an erasure- Due to limited bandwidth available at both the TOR and coded storage is drawing more attention these days. Google aggregation switches, a simple First Come First Serve (FCFS) and Amazon have published that every 500 ms extra delay policy to schedule all file requests fails to deliver satisfactory means a 1.2% user loss [1]. Modern data centers often adopt latency performance, not only because the policy lacks the a hierarchical architecture [37]. As encoded file chunks are ability to adapt to varying traffic patterns, but also due to the distributed across the system, accessing the files requires - need to apportion networking resources with respect to het- in addition to data chunk placement and dynamic request erogeneous service requirements. Thus, we study a weighted scheduling - intelligent traffic engineering solutions to handle: queueing policy at top-of-the-rack and aggregation switches, 1) data transfers between racks that go through aggregation which partition tenants into different service classes based on switches and 2) data transfers within a rack that go through their delay requirement and apply differentiated management Top-of-Rack (TOR) switches. policy to file requests generated by tenants in each service Quantifying exact latency for erasure-coded storage system class. We assume that the file requests submitted by tenants is an open problem. Recently, there has been a number of in each class are buffered and processed in a separate first- attempts at finding latency bounds for an erasure-coded storage come-first-serve queue at each switch. The service rate of these queues are tunable with the constraints that they are non- Symbol Meaning negative, and sum to at most the switch/link capacity. Tuning these weights allows us to provide differentiated service rate to N Number of racks, indexed by i = 1;:::;N tenants in different classes, therefore assigning differentiated m Number of storage servers in each rack service latency to tenants. R Number of files in the system, indexed by r = 1;:::;R In particular, a performance hit in erasure-coded storage (n; k) Erasure code for storing files systems comes when dealing with hot network switches. The D Number of services classes latency of each file request is determined by the maximum delay in retrieving k-out-of-n encoded chunks. Without proper B Total available bandwidth at the aggregate switch coordination in processing each batch of chunk requests that b Total available bandwidth at each top-of-the-rack switch jointly reconstructs a file, service latency is dominated by beff Effective bandwidth for requests from node i to node j in the same rack staggering chunk requests with the worst access latency (e.g., i;j eff chunk requests processed by heavily congested switches), sig- Bi;j;d Effective bandwidth for servicing requests from rack i to rack j nificantly increasing overall latency in the data center. To avoid wi;j;d Weight for apportioning top-of-rack switch bandwidth for service class d this, bandwidth reservation can be made for routing traffic W d among racks [24], [25], [26]. Thus, we apportion bandwidth i;j;d Weight for apportioning aggregate switch bandwidth for service class λi Arrival rate of request for file r of service class d from rack i at TOR and aggregation switches so that each flow has its rd own FCFS queue for the data transfer. We jointly optimize πi;j;r Probability of routing rack-i file-r of service class drequest to rack j bandwidth allocation and data locality (i.e., placement of d S Set of racks for placing encoded chunks of file r of service class d encoded file chunks) to achieve service latency minimization. rd Ni;j Connection delay for service from rack i to rack j For a given set of pair-wise bandwidth allocations among racks, and placement of different erasure-coded files in dif- Qi;j;d Queuing delay for service of class d from rack i to rack j ¯ ferent racks, we first find an upper bound on mean latency Ti;rd Expected latency of a request of file r from rack i of each file by applying the probabilistic scheduling policy proposed in [28]. Having constructed a quantitative latency TABLE I model, we consider a joint optimization of average service MAIN NOTATION. latency (weighted by the rate of arrival of requests, and weight of the service class) over the placement of contents of each file, the bandwidth reservation between any pair of racks (at TOR and aggregation switches), and the scheduling II. SYSTEM MODEL probabilities. This optimization is shown to be a mixed-integer We consider a data center consisting of N racks, denoted optimization, especially due to the integer constraints for by N = fi = 1; 2;:::;Ng, each equipped with m homoge- the content placement. To tackle this challenge, the latency neous servers that are available for data storage and running minimization is decoupled into 3 sub-problems; two of which applications. There is a Top-of-Rack (TOR) switch connected are proven to be convex. We propose an algorithm which to each rack to route intra-rack traffic and an aggregate switch iteratively minimizes service latency over the three engineering that connects all TOR switches for routing inter-rack traffic. A degrees of freedom with guaranteed convergence. set of files R = f1; 2;:::;Rg are distributedly stored among m ∗ N To validate our theoretical analysis and joint latency op- these servers and are accessed by client applications. timization for different tenants, we provide a prototype of Our goal is to minimize the overall file access latency of all the proposed algorithms in Tahoe [38], which is an open- applications to improve performance of the cloud system.
Recommended publications
  • Globalfs: a Strongly Consistent Multi-Site File System
    GlobalFS: A Strongly Consistent Multi-Site File System Leandro Pacheco Raluca Halalai Valerio Schiavoni University of Lugano University of Neuchatelˆ University of Neuchatelˆ Fernando Pedone Etienne Riviere` Pascal Felber University of Lugano University of Neuchatelˆ University of Neuchatelˆ Abstract consistency, availability, and tolerance to partitions. Our goal is to ensure strongly consistent file system operations This paper introduces GlobalFS, a POSIX-compliant despite node failures, at the price of possibly reduced geographically distributed file system. GlobalFS builds availability in the event of a network partition. Weak on two fundamental building blocks, an atomic multicast consistency is suitable for domain-specific applications group communication abstraction and multiple instances of where programmers can anticipate and provide resolution a single-site data store. We define four execution modes and methods for conflicts, or work with last-writer-wins show how all file system operations can be implemented resolution methods. Our rationale is that for general-purpose with these modes while ensuring strong consistency and services such as a file system, strong consistency is more tolerating failures. We describe the GlobalFS prototype in appropriate as it is both more intuitive for the users and detail and report on an extensive performance assessment. does not require human intervention in case of conflicts. We have deployed GlobalFS across all EC2 regions and Strong consistency requires ordering commands across show that the system scales geographically, providing replicas, which needs coordination among nodes at performance comparable to other state-of-the-art distributed geographically distributed sites (i.e., regions). Designing file systems for local commands and allowing for strongly strongly consistent distributed systems that provide good consistent operations over the whole system.
    [Show full text]
  • Big Data Storage Workload Characterization, Modeling and Synthetic Generation
    BIG DATA STORAGE WORKLOAD CHARACTERIZATION, MODELING AND SYNTHETIC GENERATION BY CRISTINA LUCIA ABAD DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2014 Urbana, Illinois Doctoral Committee: Professor Roy H. Campbell, Chair Professor Klara Nahrstedt Associate Professor Indranil Gupta Assistant Professor Yi Lu Dr. Ludmila Cherkasova, HP Labs Abstract A huge increase in data storage and processing requirements has lead to Big Data, for which next generation storage systems are being designed and implemented. As Big Data stresses the storage layer in new ways, a better understanding of these workloads and the availability of flexible workload generators are increas- ingly important to facilitate the proper design and performance tuning of storage subsystems like data replication, metadata management, and caching. Our hypothesis is that the autonomic modeling of Big Data storage system workloads through a combination of measurement, and statistical and machine learning techniques is feasible, novel, and useful. We consider the case of one common type of Big Data storage cluster: A cluster dedicated to supporting a mix of MapReduce jobs. We analyze 6-month traces from two large clusters at Yahoo and identify interesting properties of the workloads. We present a novel model for capturing popularity and short-term temporal correlations in object re- quest streams, and show how unsupervised statistical clustering can be used to enable autonomic type-aware workload generation that is suitable for emerging workloads. We extend this model to include other relevant properties of stor- age systems (file creation and deletion, pre-existing namespaces and hierarchical namespaces) and use the extended model to implement MimesisBench, a realistic namespace metadata benchmark for next-generation storage systems.
    [Show full text]
  • Latency and Throughput Optimization in Modern Networks: a Comprehensive Survey Amir Mirzaeinnia, Mehdi Mirzaeinia, and Abdelmounaam Rezgui
    READY TO SUBMIT TO IEEE COMMUNICATIONS SURVEYS & TUTORIALS JOURNAL 1 Latency and Throughput Optimization in Modern Networks: A Comprehensive Survey Amir Mirzaeinnia, Mehdi Mirzaeinia, and Abdelmounaam Rezgui Abstract—Modern applications are highly sensitive to com- On one hand every user likes to send and receive their munication delays and throughput. This paper surveys major data as quickly as possible. On the other hand the network attempts on reducing latency and increasing the throughput. infrastructure that connects users has limited capacities and These methods are surveyed on different networks and surrond- ings such as wired networks, wireless networks, application layer these are usually shared among users. There are some tech- transport control, Remote Direct Memory Access, and machine nologies that dedicate their resources to some users but they learning based transport control, are not very much commonly used. The reason is that although Index Terms—Rate and Congestion Control , Internet, Data dedicated resources are more secure they are more expensive Center, 5G, Cellular Networks, Remote Direct Memory Access, to implement. Sharing a physical channel among multiple Named Data Network, Machine Learning transmitters needs a technique to control their rate in proper time. The very first congestion network collapse was observed and reported by Van Jacobson in 1986. This caused about a I. INTRODUCTION thousand time rate reduction from 32kbps to 40bps [3] which Recent applications such as Virtual Reality (VR), au- is about a thousand times rate reduction. Since then very tonomous cars or aerial vehicles, and telehealth need high different variations of the Transport Control Protocol (TCP) throughput and low latency communication.
    [Show full text]
  • A Decentralized Cloud Storage Network Framework
    Storj: A Decentralized Cloud Storage Network Framework Storj Labs, Inc. October 30, 2018 v3.0 https://github.com/storj/whitepaper 2 Copyright © 2018 Storj Labs, Inc. and Subsidiaries This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 license (CC BY-SA 3.0). All product names, logos, and brands used or cited in this document are property of their respective own- ers. All company, product, and service names used herein are for identification purposes only. Use of these names, logos, and brands does not imply endorsement. Contents 0.1 Abstract 6 0.2 Contributors 6 1 Introduction ...................................................7 2 Storj design constraints .......................................9 2.1 Security and privacy 9 2.2 Decentralization 9 2.3 Marketplace and economics 10 2.4 Amazon S3 compatibility 12 2.5 Durability, device failure, and churn 12 2.6 Latency 13 2.7 Bandwidth 14 2.8 Object size 15 2.9 Byzantine fault tolerance 15 2.10 Coordination avoidance 16 3 Framework ................................................... 18 3.1 Framework overview 18 3.2 Storage nodes 19 3.3 Peer-to-peer communication and discovery 19 3.4 Redundancy 19 3.5 Metadata 23 3.6 Encryption 24 3.7 Audits and reputation 25 3.8 Data repair 25 3.9 Payments 26 4 4 Concrete implementation .................................... 27 4.1 Definitions 27 4.2 Peer classes 30 4.3 Storage node 31 4.4 Node identity 32 4.5 Peer-to-peer communication 33 4.6 Node discovery 33 4.7 Redundancy 35 4.8 Structured file storage 36 4.9 Metadata 39 4.10 Satellite 41 4.11 Encryption 42 4.12 Authorization 43 4.13 Audits 44 4.14 Data repair 45 4.15 Storage node reputation 47 4.16 Payments 49 4.17 Bandwidth allocation 50 4.18 Satellite reputation 53 4.19 Garbage collection 53 4.20 Uplink 54 4.21 Quality control and branding 55 5 Walkthroughs ...............................................
    [Show full text]
  • Measuring Latency Variation in the Internet
    Measuring Latency Variation in the Internet Toke Høiland-Jørgensen Bengt Ahlgren Per Hurtig Dept of Computer Science SICS Dept of Computer Science Karlstad University, Sweden Box 1263, 164 29 Kista Karlstad University, Sweden toke.hoiland- Sweden [email protected] [email protected] [email protected] Anna Brunstrom Dept of Computer Science Karlstad University, Sweden [email protected] ABSTRACT 1. INTRODUCTION We analyse two complementary datasets to quantify the la- As applications turn ever more interactive, network la- tency variation experienced by internet end-users: (i) a large- tency plays an increasingly important role for their perfor- scale active measurement dataset (from the Measurement mance. The end-goal is to get as close as possible to the Lab Network Diagnostic Tool) which shed light on long- physical limitations of the speed of light [25]. However, to- term trends and regional differences; and (ii) passive mea- day the latency of internet connections is often larger than it surement data from an access aggregation link which is used needs to be. In this work we set out to quantify how much. to analyse the edge links closest to the user. Having this information available is important to guide work The analysis shows that variation in latency is both com- that sets out to improve the latency behaviour of the inter- mon and of significant magnitude, with two thirds of sam- net; and for authors of latency-sensitive applications (such ples exceeding 100 ms of variation. The variation is seen as Voice over IP, or even many web applications) that seek within single connections as well as between connections to to predict the performance they can expect from the network.
    [Show full text]
  • The Effects of Latency on Player Performance and Experience in A
    The Effects of Latency on Player Performance and Experience in a Cloud Gaming System Robert Dabrowski, Christian Manuel, Robert Smieja May 7, 2014 An Interactive Qualifying Project Report: submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science Approved by: Professor Mark Claypool, Advisor Professor David Finkel, Advisor This report represents the work of three WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its web site without editorial or peer review. Abstract Due to the increasing popularity of thin client systems for gaming, it is important to un- derstand the effects of different network conditions on users. This paper describes our experiments to determine the effects of latency on player performance and quality of expe- rience (QoE). For our experiments, we collected player scores and subjective ratings from users as they played short game sessions with different amounts of additional latency. We found that QoE ratings and player scores decrease linearly as latency is added. For ev- ery 100 ms of added latency, players reduced their QoE ratings by 14% on average. This information may provide insight to game designers and network engineers on how latency affects the users, allowing them to optimize their systems while understanding the effects on their clients. This experiment design should also prove useful to thin client researchers looking to conduct user studies while controlling not only latency, but also other network conditions like packet loss. Contents 1 Introduction 1 2 Background Research 4 2.1 Thin Client Technology .
    [Show full text]
  • Evaluating the Latency Impact of Ipv6 on a High Frequency Trading System
    Evaluating the Latency Impact of IPv6 on a High Frequency Trading System Nereus Lobo, Vaibhav Malik, Chris Donnally, Seth Jahne, Harshil Jhaveri [email protected] , [email protected] , [email protected] , [email protected] , [email protected] A capstone paper submitted as partial fulfillment of the requirements for the degree of Masters in Interdisciplinary Telecommunications at the University of Colorado, Boulder, 4 May 2012. Project directed by Dr. Pieter Poll and Professor Andrew Crain. 1 Introduction Employing latency-dependent strategies, financial trading firms rely on trade execution speed to obtain a price advantage on an asset in order to earn a profit of a fraction of a cent per asset share [1]. Through successful execution of these strategies, trading firms are able to realize profits on the order of billions of dollars per year [2]. The key to success for these trading strategies are ultra-low latency processing and networking systems, henceforth called High Frequency Trading (HFT) systems, which enable trading firms to execute orders with the necessary speed to realize a profit [1]. However, competition from other trading firms magnifies the need to achieve the lowest latency possible. A 1 µs latency disadvantage can result in unrealized profits on the order of $1 million per day [3]. For this reason, trading firms spend billions of dollars on their data center infrastructure to ensure the lowest propagation delay possible [4]. Further, trading firms have expanded their focus on latency optimization to other aspects of their trading infrastructure including application performance, inter-application messaging performance, and network infrastructure modernization [5].
    [Show full text]
  • Low-Latency Networking: Where Latency Lurks and How to Tame It Xiaolin Jiang, Hossein S
    1 Low-latency Networking: Where Latency Lurks and How to Tame It Xiaolin Jiang, Hossein S. Ghadikolaei, Student Member, IEEE, Gabor Fodor, Senior Member, IEEE, Eytan Modiano, Fellow, IEEE, Zhibo Pang, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE, and Carlo Fischione Member, IEEE Abstract—While the current generation of mobile and fixed The second step in the communication networks revolutions communication networks has been standardized for mobile has made PSTN indistinguishable from our everyday life. Such broadband services, the next generation is driven by the vision step is the Global System for Mobile (GSM) communication of the Internet of Things and mission critical communication services requiring latency in the order of milliseconds or sub- standards suite. In the beginning of the 2000, GSM has become milliseconds. However, these new stringent requirements have a the most widely spread mobile communications system, thanks large technical impact on the design of all layers of the commu- to the support for users mobility, subscriber identity confiden- nication protocol stack. The cross layer interactions are complex tiality, subscriber authentication as well as confidentiality of due to the multiple design principles and technologies that user traffic and signaling [4]. The PSTN and its extension via contribute to the layers’ design and fundamental performance limitations. We will be able to develop low-latency networks only the GSM wireless access networks have been a tremendous if we address the problem of these complex interactions from the success in terms of Weiser’s vision, and also paved the way new point of view of sub-milliseconds latency. In this article, we for new business models built around mobility, high reliability, propose a holistic analysis and classification of the main design and latency as required from the perspective of voice services.
    [Show full text]
  • Simulation and Comparison of Various Scheduling Algorithm for Improving the Interrupt Latency of Real –Time Kernal
    Journal of Computer Science and Applications. ISSN 2231-1270 Volume 6, Number 2 (2014), pp. 115-123 © International Research Publication House http://www.irphouse.com Simulation And Comparison of Various Scheduling Algorithm For Improving The Interrupt Latency of Real –Time Kernal 1.Lavanya Dhanesh 2.Dr.P.Murugesan 1.Research Scholar, Sathyabama University, Chennai, India. 2.Professor, S.A. Engineering College, Chennai, India. Email:1. [email protected] Abstract The main objective of the research is to improve the performance of the Real- time Interrupt Latency using Pre-emptive task Scheduling Algorithm. Interrupt Latency provides an important metric in increasing the performance of the Real Time Kernal So far the research has been investigated with respect to real-time latency reduction to improve the task switching as well the performance of the CPU. Based on the literature survey, the pre-emptive task scheduling plays an vital role in increasing the performance of the interrupt latency. A general disadvantage of the non-preemptive discipline is that it introduces additional blocking time in higher priority tasks, so reducing schedulability . If the interrupt latency is increased the task switching delay shall be increasing with respect to each task. Hence most of the research work has been focussed to reduce interrupt latency by many methods. The key area identified is, we cannot control the hardware interrupt delay but we can improve the Interrupt service as quick as possible by reducing the no of preemptions. Based on this idea, so many researches has been involved to optimize the pre-emptive scheduling scheme to reduce the real-time interrupt latency.
    [Show full text]
  • Telematic Performance and the Challenge of Latency
    This is a repository copy of Telematic performance and the challenge of latency. White Rose Research Online URL for this paper: https://eprints.whiterose.ac.uk/126501/ Version: Accepted Version Article: Rofe, Michael and Reuben, Federico orcid.org/0000-0003-1330-7346 (2017) Telematic performance and the challenge of latency. The Journal of Music, Technology and Education. 167–183. ISSN 1752-7074 https://doi.org/10.1386/jmte.10.2-3.167_1 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Telematic performance and the challenge of latency Michael Rofe | Federico Reuben Abstract Any attempt to perform music over a network requires engagement with the issue of latency. Either latency needs to be reduced to the point where it is no longer noticeable or creative alternatives to working with latency need to be developed. Given that Online Orchestra aimed to enable performance in community contexts, where significant bandwidth and specialist equipment were not available, it would not be possible to reduce latency below the 20–30ms cut-off at which it becomes noticeable.
    [Show full text]
  • Action-Sound Latency: Are Our Tools Fast Enough?
    Action-Sound Latency: Are Our Tools Fast Enough? Andrew P. McPherson Robert H. Jack Giulio Moro Centre for Digital Music Centre for Digital Music Centre for Digital Music School of EECS School of EECS School of EECS Queen Mary U. of London Queen Mary U. of London Queen Mary U. of London [email protected] [email protected] [email protected] ABSTRACT accepted guidelines for latency and jitter (variation in la- The importance of low and consistent latency in interactive tency). music systems is well-established. So how do commonly- Where previous papers have focused on latency in a sin- used tools for creating digital musical instruments and other gle component (e.g. audio throughput latency [21, 20] and tangible interfaces perform in terms of latency from user ac- roundtrip network latency [17]), this paper measures the tion to sound output? This paper examines several common latency of complete platforms commonly employed to cre- configurations where a microcontroller (e.g. Arduino) or ate digital musical instruments. Within these platforms we wireless device communicates with computer-based sound test the most reductive possible setup: producing an audio generator (e.g. Max/MSP, Pd). We find that, perhaps \click" in response to a change on a single digital or ana- surprisingly, almost none of the tested configurations meet log pin. This provides a minimum latency measurement for generally-accepted guidelines for latency and jitter. To ad- any tool created on that platform; naturally, the designer's dress this limitation, the paper presents a new embedded application may introduce additional latency through filter platform, Bela, which is capable of complex audio and sen- group delay, block-based processing or other buffering.
    [Show full text]
  • 5G Qos: Impact of Security Functions on Latency
    5G QoS: Impact of Security Functions on Latency Sebastian Gallenmuller¨ ∗, Johannes Naab∗, Iris Adamy, Georg Carle∗ ∗Technical University of Munich, yNokia Bell Labs ∗fgallenmu, naab, [email protected], [email protected] Abstract—Network slicing is considered a key enabler to low latency and high predictability on the other side can go 5th Generation (5G) communication networks. Mobile network together. The goals of our investigation are threefold: (i) cre- operators may deploy network slices—complete logical networks ating a low-latency packet processing architecture for security customized for specific services expecting a certain Quality of Service (QoS). New business models like Network Slice-as-a- functions with minimal packet loss, (ii) conducting extensive Service offerings to customers from vertical industries require ne- measurements applying hardware-supported timestamping to gotiated Service Level Agreements (SLA), and network providers precisely determine worst-case latencies, and (iii) introducing need automated enforcement mechanisms to assure QoS during a model to predict the capacity of our low-latency system for instantiation and operation of slices. In this paper, we focus on overload prevention. Our proposed system architecture relies ultra-reliable low-latency communication (URLLC). We propose a software architecture for security functions based on off- on well-known applications and libraries such as Linux, the the-shelf hardware and open-source software and demonstrate, Data Plane Development Kit (DPDK), and Snort. Besides the through a series of measurements, that the strict requirements of specific measurements for the Snort IPS, we investigate the URLLC services can be achieved. As a real-world example, we performance of the underlying operating system (OS) and perform our experiments using the intrusion prevention system libraries in use, namely Linux and DPDK, which emphasizes (IPS) Snort to demonstrate the impact of security functions on latency.
    [Show full text]